Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Security in the News
Edit
438
…
1
Tags
39.
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Summer 2012:
Cyber Attack Targets Gas Pipeline Companies
Summary
⇧
2.
Article : Hacked Utah health data guarded by weak password
Summary
3.
Low Tech Hacker Breaks Into Celebrity E-mail accounts
John McBride
4.
Iran Confirms Attack by Virus That Collects Information
Andrea Milic
6.
Google Chrome Tabs Let Malware Sneak Into Businesses
Ryan Bingell
7.
US warns users of new Citadel ransomware hit
Asad Merchant
8.
Cross-Browser Malware Spreading Through Facebook.
Seunghyun Lee
9.
Key Internet operator VeriSign hit by hackers
Lana Kuzminskaya-Summary
10. Nissan Is Latest Company to Get Hacked
Steve Miller
11.
Senator asks for details in Thrift Savings breach
Heather Anderson
13.
Not Built Ford Tough
Mark Buhring
14.
Romney Campaign Investigates Hotmail Account Hack
Jeri Samet
15.
6.4 Million Passwords Reportedly Stolen From LinkedIn Website
Asad Merchant
16.
On Password Security
Alicia Hasty
17.
Google: Cyberspies Have Many Eyes, and Some Are Looking at Gmail
Stephanie Watkins
18.
Cyber warfare Gets Political
Julia Vezina (Summary)
19.
Student phishing scam (BBC news)
Angelina Fernandez
20.
CloudFlare Security Breach
Jacob Booth
21.
HIPPA Privacy and Security Audit Results
Alicia Hasty
22.
Alleged Lulzsec member, Ryan Cleary, indicted in U.S.
Tan
ia Dunn
23.
Experts warn of shortage of U.S. cyber pros
Tania Dunn
24.
Hacked companies fight back with controversial steps
Brenton Oswandel
25.
Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account
Brenton Oswandel
26.
Legislators set to Toughen Identity Theft Law (Tampa)
Harmony Lazore
27.
RSA Security - Advanced Persistent Threat (APT) attack
Buhring, Mark
28.
MTNL Website Hacked By Anonymous
Melissa McCroan
29.
FBI, DEA warn IPv6 could shield criminals from police
Abdeljalil Ezziouri
30.
Foxconn Hit By Security Breach
Melissa McCroan
31.
FBI & DEA Warn That IPv6 May Be Too Damn Anonymous
Kevin Gay
32.
Fujitsu Cracks Next-Gen Cryptography Standard
Kevin Gay
33.
DCF Security Breach
Christina Parnell
34.
JPL Computers Hacked
Christina Parnell
35.
Aerospace Cyber-Attack
Jacob Booth
36.
Malware for Macs Lucrative, Security Researchers Say
Jeri Samet
37.
Machine Politics.pdf
Details
Download
979 KB
John McBride
38.
NASA Repeatedly Attacked, Jet Propulsion Lab Compromised
Dale West
39.
The Real Lessons Of Gawker's Security Mess
Dale West
40.
Hackers grab customer data, demand cash from payday lender
Jonathan Young
AIS Security in the news 1.docx
Details
Download
13 KB
41.
Google Play Exploits Bypass Malware Checks
Steven Thompson
42.
7 Lessons from MilitarySingles.com Hack
Steven Thompson
43.
Hackers Take Credit for Twitter Outages
Tim Houmes
44.
Global Payments falls on data hack update
Tim Houmes
45.
CFTC Data Breach
Chandni Kalra
46.
Google Apps Security Beat By CloudFlare Hackers
Heather Anderson
47.
FTC Sues Hotel Operator Wyndham Worldwide Over Data Breaches
Ryne Stone
48.
Cybercriminals Using 'Lego' Approach to Crime Kit Development
Ryne Stone
49.
Hackers targeting Indian banks with new tools
Chandni Kalra
50.
Sophisticated Global Fraud Operation Detailed in New Report
Abdeljalil Ezziouri
51.
The quest for an unhackable code
Robert Trimble
52.
Pentagon Admits Major Data Breach as It Unveils Defensive Cyber-Strategy
Haidan Wang-1.doc
Details
Download
34 KB
53.
Huge spike in spam delivers flood of malware to inboxes in August
Haidan Wang.doc
Details
Download
21 KB
54.
Global financial cybercrime sting yields 24 arrests
by
Kenneth Loricchio
42 . Researchers use spoofing to hack into a flying drone
by
Stephanie Watkins
55.
Following security breach, expect a lot of spam
Monika Borches
56.
FTC Hits Wyndham Hotels With Lawsuit Over Three Hacker Breaches In Two Years
by
Kenneth Loricchio
57.
Security Breaches Shake Confidence in Credit-Card Safety
Jenn Patterson
58.
Chinese Hackers penetrate Indian Navy
Jonathan Young
59.
Denial-of-Service Attack Knocks Twitter Offline (Updated)
Monika Borches
60.
Cyber crime moves to the cloud
Two hackers plead guilty to LulzSec attacks on Web sites
Security in the news.docx
Details
Download
12 KB
Rebecca Curry
61.
Phisher Convicted in Massive Scheme
Bianca Bloomfield
62.
Feds Charge Hacker in POS Attacks
Bianca Bloomfield
63.
Feds Sue Wyhdham Hotels Over Repeated Computer Hacks
Harmony Lazore
64.
MasterCard and Visa Investigate Data Breach
Heather Anderson
65.
Cybercriminals increasingly use online banking fraud automation techniques
Stacy Cohn
66.
Nokia Developer Database Compromised by SQL Injection
Robert Trimble
67.
New OS X Tibet malware variant surfaces
Victoria Barnett
68.
Microsoft identifies two Zeus botnet crime ring suspects
Victoria Barnett
69.
MD Anderson Cancer Center Security Breach
Steve Miller
70.
Anonymous Hacker Hits Arizona boarding school.
Seunghyun Lee
71
Latest hacker dump looks like Comcast, AT&T data
Richard Max Metro.docx
Details
Download
13 KB
72
eHarmony says no other info stolen following password hack
Richard Metro.docx
Details
Download
13 KB
73
Japan Android Malware scheme
Shantavia C.docx
Details
Download
56 KB
Conner
74
FBI Official says cybercriminals unsustainable
Shantavia C.docx
Details
Download
56 KB
Conner
75.
Security Breach: Lost Data Cartridges May Have Exposed Personal Records
Svetlana Kuzminskaya
76.
'Printer Bomb' Malware Spread Via Compromised .htaccess Files, Says Symantec
Monika Negron
77.
2-Year Sting Nets FBI Dozens of Suspected Cybercrooks
Brice Husselbaugh
78.
Malware Goes Mobile
Julia Vezina (Summary 2)
79.
RSA Encryption 'Crack' Rattles Infosec Industry
Brice Husselbaugh
80.
Researchers Link Sykipot Trojan to Spear-Phishing Attacks
Monika Negron
81.
Olympic experts sure they can repel cyber threat
Hong Wang
82.
Virus could black out nearly 250,000 PCs
Hong Wang
83.
Security breach found at BCIT campus health clinic
Arielle Benson
84.
NasDaq Servers Compromised
Arielle Benson 2
85.
Boxer SMS Trojan poses as Firefox for Android
Stacey Samball
86.
LinkedIn breach puts site's reputation on the line
Stacey Samball
87.
Iranian Hackers Suspected in Recent Security Breach
Holly Nichols
88.
Hackers strike again, hit Nvidia's developer zone
Hong Wang
Fall 2011
AICPA Top Technology Initiatives
Safari on Mac OS X vulnerable to Man-in-the-Middle attacks
And a Fix for IOS5
New cyber war guidelines
&
US //Matrix//-style Cyberwar firing range moves forward
HBGary Federal hacked and exposed by Anonymous
Google Maps Listings Marred By False Information
Hackers break SSL
And a Fix for IOS5
Lion Security Flaw
On the Internet, Nobody Knows You’re a Robot
The Worm that could bring down the Internet
(
NPR
's Fresh Air, 09/27/2011)
Man-in-the-Middle Standing between you and your cash
(RSA, 10//5/2011)
U.S. Drone Virus Attack
(10/13/2011)
New Malicious Program by Creators of Stuxnet
How to secure your email with OS X and iOS5
(ars technica, 10/18/2011)
The Nitro Attacks: Stealing Secrets from the Chemical Industry
Duqu Worm Targets Microsoft Word
Charlie Miller Article
Millions of printers open to devastating hack attack, researchers say
Commercial Spookware
- this is really scary stuff. (The
[[#|Register]]
, 12/01/2011)
Spring 2012
In Planning Digital Defenses, the Biggest Obstacle Is Human Ingenuity
(NY Times, 12/05/2011)
CyberSecurity Insurance
(NY Times, Bits Blog, 12/23/2011)
Hackers Breach Website of Stratfor Global Security
(NY Times, 12/26/2011)
AntiSec Hits Private Intel Firm (Stratfor)
(Wired, 12/26/2011)
2012 IT Security Predictions
2012-Predictions-WS-Security-Labs.pdf
Details
Download
283 KB
Duqu, son of Stuxnet?
(SC Magazine, 01/13/2012)
Hackers disrupt Israel's stock exchange
(MSNBC, 1/16/2012)
Zappos says hackers may have accessed info on 24 million customers
(MSNBC, 1/16/2012)
KoobFace Hacking Group
(NY Times, 01/17/2012)
Olympic security dossier left on London train
(info security.com 1/19/2012)
Anonymous hackers at it again
(MSNBC, 1/19/2012)
Anonymous Just Deleted CBS.com and Took Down Universal
(Gizmodo.com 1/22/12)
Boardroom Videoconferencing Vulnerabilities
(NY Times, 1/23/2012)
Cyber-Crime in 2012
(ITP.net, 1/20/2012)
http://www.examiner.com/anonymous-in-national/ufc-s-dana-white-suffers-knock-out-after-challenging-anonymous
(examiner.com 1/26/12)
http://www.youtube.com/watch?v=15IRZdEUO20&feature=player_embedded#!
(youtube ufc hack 1/26/12)
The first computer password?
(Ars Technica, 1/27/12)
http://thesocietypages.org/cyborgology/2012/02/01/there-is-no-cyberspace/
(The Society Pages, 2/1/12)
http://www.sec.gov/Archives/edgar/data/1014473/000119312511285850/d219781d10q.htm
EU coming Security Strategy
(InfoSecurity, 2/7/12)
Android App Malware Botnets
(oh my!), InfoSecurity, 2/9/12)
Ex-IRS Employee Sentenced for Identity Theft
(Accounting Today, 2/10/12)
Developers say Apple needs to overhaul iOS user information security
(Ars Technica, 2/15/12)
Anonymous targets Canadian MP and his Internet Protection Bill.
NIST establishes National Cybersecurity Center of Excellence
(
Press Release
, 2/21/12)
Safari Trackers
(Mostly technical stuff here, 2/17/12)
Anatomy of an Anonymous attack
(Imperva, 2/12)
http://money.cnn.com/2012/02/28/technology/rsa_cybersecurity_attacks/index.htm
The Future of Quantum Computing
(ZMEScience 2/28/12)
ISS command and control codes lost
(
NPR
, 3/1/2012)
Anonymous hackers tricked into installing Malware
Lulzsec alleged Leader pleads guilty (and takes others with him?)
(
NPR
, 3/6/12)
MISMirage.pdf
Details
Download
906 KB
This is not really "security in the news" but is an article from 1972 that I found interesting.
Anonymous members speak out at surreal SXSW panel
(CNN Tech, 3/15/12)
AICPA 2012 Top 10
2012-TTI- whitepaper.pdf
Details
Download
2 MB
http://www.sys-con.com/node/2227418
"Bit9 to Exhibit Advanced Threat Protection Platform at 2012 DoDIIS Conference in Denver," focus on intellectual property
http://www.bit9.com/
37.
http://online.wsj.com/article/SB10001424052702304177104577307773326180032.html?KEYWORDS=fbi+hack
"US Outgunned in Hacker War"
(
Wall Street Journal
, 3/28/2012)
38.
Warned of an Attack on the Internet, and Getting Ready
(NY Times, 3/31/12)
39.
Exploit released for hijacking critical infrastructure
(Wired, 4/5/12)
40.
Ai Weiwei, Chinese government friction intensifies over webcams
(LA Times Blogs, 4/5/12)
41.
Check your Mac for the Flashback Trojan
(github.com)
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Summer 2012:
- Cyber Attack Targets Gas Pipeline Companies Summary ⇧
2. Article : Hacked Utah health data guarded by weak passwordSummary3. Low Tech Hacker Breaks Into Celebrity E-mail accountsJohn McBride
4. Iran Confirms Attack by Virus That Collects Information Andrea Milic
6. Google Chrome Tabs Let Malware Sneak Into Businesses Ryan Bingell
7. US warns users of new Citadel ransomware hit Asad Merchant
8. Cross-Browser Malware Spreading Through Facebook.Seunghyun Lee
9. Key Internet operator VeriSign hit by hackers Lana Kuzminskaya-Summary
10. Nissan Is Latest Company to Get Hacked Steve Miller
11. Senator asks for details in Thrift Savings breach Heather Anderson
13. Not Built Ford Tough Mark Buhring
14. Romney Campaign Investigates Hotmail Account HackJeri Samet
15. 6.4 Million Passwords Reportedly Stolen From LinkedIn Website Asad Merchant
16. On Password Security Alicia Hasty
17. Google: Cyberspies Have Many Eyes, and Some Are Looking at Gmail Stephanie Watkins
18. Cyber warfare Gets Political Julia Vezina (Summary)
19. Student phishing scam (BBC news) Angelina Fernandez
20. CloudFlare Security Breach Jacob Booth
21. HIPPA Privacy and Security Audit Results Alicia Hasty
22.Alleged Lulzsec member, Ryan Cleary, indicted in U.S.Tania Dunn
23.Experts warn of shortage of U.S. cyber prosTania Dunn
24. Hacked companies fight back with controversial steps Brenton Oswandel
25. Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account Brenton Oswandel
26. Legislators set to Toughen Identity Theft Law (Tampa) Harmony Lazore
27. RSA Security - Advanced Persistent Threat (APT) attack Buhring, Mark
28. MTNL Website Hacked By AnonymousMelissa McCroan
29. FBI, DEA warn IPv6 could shield criminals from policeAbdeljalil Ezziouri
30. Foxconn Hit By Security BreachMelissa McCroan
31. FBI & DEA Warn That IPv6 May Be Too Damn Anonymous Kevin Gay
32. Fujitsu Cracks Next-Gen Cryptography Standard Kevin Gay
33. DCF Security BreachChristina Parnell
34. JPL Computers HackedChristina Parnell
35. Aerospace Cyber-Attack Jacob Booth
36. Malware for Macs Lucrative, Security Researchers Say Jeri Samet
37.
38. NASA Repeatedly Attacked, Jet Propulsion Lab Compromised Dale West
39. The Real Lessons Of Gawker's Security Mess Dale West
40. Hackers grab customer data, demand cash from payday lender Jonathan Young
41. Google Play Exploits Bypass Malware Checks Steven Thompson
42. 7 Lessons from MilitarySingles.com Hack Steven Thompson
43. Hackers Take Credit for Twitter Outages Tim Houmes
44. Global Payments falls on data hack update Tim Houmes
45. CFTC Data Breach Chandni Kalra
46. Google Apps Security Beat By CloudFlare Hackers Heather Anderson
47. FTC Sues Hotel Operator Wyndham Worldwide Over Data Breaches Ryne Stone
48. Cybercriminals Using 'Lego' Approach to Crime Kit Development Ryne Stone
49. Hackers targeting Indian banks with new tools Chandni Kalra
50.Sophisticated Global Fraud Operation Detailed in New Report Abdeljalil Ezziouri
51. The quest for an unhackable codeRobert Trimble
52. Pentagon Admits Major Data Breach as It Unveils Defensive Cyber-Strategy
53. Huge spike in spam delivers flood of malware to inboxes in August
54. Global financial cybercrime sting yields 24 arrests by Kenneth Loricchio
42 . Researchers use spoofing to hack into a flying drone by Stephanie Watkins
55. Following security breach, expect a lot of spamMonika Borches
56. FTC Hits Wyndham Hotels With Lawsuit Over Three Hacker Breaches In Two Years by Kenneth Loricchio
57. Security Breaches Shake Confidence in Credit-Card Safety Jenn Patterson
58. Chinese Hackers penetrate Indian Navy Jonathan Young
59. Denial-of-Service Attack Knocks Twitter Offline (Updated) Monika Borches
60. Cyber crime moves to the cloud Two hackers plead guilty to LulzSec attacks on Web sites
61. Phisher Convicted in Massive SchemeBianca Bloomfield
62. Feds Charge Hacker in POS AttacksBianca Bloomfield
63. Feds Sue Wyhdham Hotels Over Repeated Computer Hacks Harmony Lazore
64. MasterCard and Visa Investigate Data Breach Heather Anderson
65. Cybercriminals increasingly use online banking fraud automation techniquesStacy Cohn
66. Nokia Developer Database Compromised by SQL InjectionRobert Trimble
67. New OS X Tibet malware variant surfaces Victoria Barnett
68. Microsoft identifies two Zeus botnet crime ring suspectsVictoria Barnett
69. MD Anderson Cancer Center Security BreachSteve Miller
70. Anonymous Hacker Hits Arizona boarding school.Seunghyun Lee
71 Latest hacker dump looks like Comcast, AT&T data
72 eHarmony says no other info stolen following password hack
73 Japan Android Malware scheme
74 FBI Official says cybercriminals unsustainable
75.Security Breach: Lost Data Cartridges May Have Exposed Personal Records Svetlana Kuzminskaya
76. 'Printer Bomb' Malware Spread Via Compromised .htaccess Files, Says SymantecMonika Negron
77. 2-Year Sting Nets FBI Dozens of Suspected Cybercrooks Brice Husselbaugh
78. Malware Goes MobileJulia Vezina (Summary 2)
79. RSA Encryption 'Crack' Rattles Infosec Industry Brice Husselbaugh
80. Researchers Link Sykipot Trojan to Spear-Phishing Attacks Monika Negron
81.Olympic experts sure they can repel cyber threatHong Wang
82.Virus could black out nearly 250,000 PCsHong Wang
83. Security breach found at BCIT campus health clinic Arielle Benson
84. NasDaq Servers CompromisedArielle Benson 2
85. Boxer SMS Trojan poses as Firefox for Android Stacey Samball
86. LinkedIn breach puts site's reputation on the lineStacey Samball
87.Iranian Hackers Suspected in Recent Security BreachHolly Nichols
88.Hackers strike again, hit Nvidia's developer zoneHong Wang
Fall 2011
Spring 2012
- In Planning Digital Defenses, the Biggest Obstacle Is Human Ingenuity(NY Times, 12/05/2011)
- CyberSecurity Insurance (NY Times, Bits Blog, 12/23/2011)
- Hackers Breach Website of Stratfor Global Security (NY Times, 12/26/2011)
- AntiSec Hits Private Intel Firm (Stratfor) (Wired, 12/26/2011)
- 2012 IT Security Predictions

2012-Predictions-WS-Security-Labs.pdf
- Details
- Download
- 283 KB
- Duqu, son of Stuxnet? (SC Magazine, 01/13/2012)
- Hackers disrupt Israel's stock exchange (MSNBC, 1/16/2012)
- Zappos says hackers may have accessed info on 24 million customers (MSNBC, 1/16/2012)
- KoobFace Hacking Group (NY Times, 01/17/2012)
- Olympic security dossier left on London train (info security.com 1/19/2012)
- Anonymous hackers at it again(MSNBC, 1/19/2012)
- Anonymous Just Deleted CBS.com and Took Down Universal (Gizmodo.com 1/22/12)
- Boardroom Videoconferencing Vulnerabilities (NY Times, 1/23/2012)
- Cyber-Crime in 2012 (ITP.net, 1/20/2012)
- http://www.examiner.com/anonymous-in-national/ufc-s-dana-white-suffers-knock-out-after-challenging-anonymous (examiner.com 1/26/12)
- http://www.youtube.com/watch?v=15IRZdEUO20&feature=player_embedded#! (youtube ufc hack 1/26/12)
- The first computer password? (Ars Technica, 1/27/12)
- http://thesocietypages.org/cyborgology/2012/02/01/there-is-no-cyberspace/ (The Society Pages, 2/1/12)
- http://www.sec.gov/Archives/edgar/data/1014473/000119312511285850/d219781d10q.htm
- EU coming Security Strategy (InfoSecurity, 2/7/12)
- Android App Malware Botnets (oh my!), InfoSecurity, 2/9/12)
- Ex-IRS Employee Sentenced for Identity Theft(Accounting Today, 2/10/12)
- Developers say Apple needs to overhaul iOS user information security (Ars Technica, 2/15/12)
- Anonymous targets Canadian MP and his Internet Protection Bill.
- NIST establishes National Cybersecurity Center of Excellence (Press Release, 2/21/12)
- Safari Trackers (Mostly technical stuff here, 2/17/12)
- Anatomy of an Anonymous attack (Imperva, 2/12)
- http://money.cnn.com/2012/02/28/technology/rsa_cybersecurity_attacks/index.htm
- The Future of Quantum Computing (ZMEScience 2/28/12)
- ISS command and control codes lost(NPR, 3/1/2012)
- Anonymous hackers tricked into installing Malware
- Lulzsec alleged Leader pleads guilty (and takes others with him?) (NPR, 3/6/12)

MISMirage.pdf
- Details
- Download
- 906 KB
- Anonymous members speak out at surreal SXSW panel(CNN Tech, 3/15/12)
- AICPA 2012 Top 10

2012-TTI- whitepaper.pdf
- Details
- Download
- 2 MB
- http://www.sys-con.com/node/2227418 "Bit9 to Exhibit Advanced Threat Protection Platform at 2012 DoDIIS Conference in Denver," focus on intellectual property
http://www.bit9.com/This is not really "security in the news" but is an article from 1972 that I found interesting.
37. http://online.wsj.com/article/SB10001424052702304177104577307773326180032.html?KEYWORDS=fbi+hack "US Outgunned in Hacker War"
(Wall Street Journal, 3/28/2012)
38. Warned of an Attack on the Internet, and Getting Ready(NY Times, 3/31/12)
39. Exploit released for hijacking critical infrastructure (Wired, 4/5/12)
40. Ai Weiwei, Chinese government friction intensifies over webcams(LA Times Blogs, 4/5/12)
41. Check your Mac for the Flashback Trojan(github.com)